Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2011-1929

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-24 May, 2011 | 23:00
Updated At-06 Aug, 2024 | 22:46
Rejected At-
Credits

lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:24 May, 2011 | 23:00
Updated At:06 Aug, 2024 | 22:46
Rejected At:
▼CVE Numbering Authority (CNA)

lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061384.html
vendor-advisory
x_refsource_FEDORA
http://hg.dovecot.org/dovecot-1.1/rev/3698dfe0f21c
x_refsource_CONFIRM
http://secunia.com/advisories/44771
third-party-advisory
x_refsource_SECUNIA
http://dovecot.org/pipermail/dovecot/2011-May/059086.html
mailing-list
x_refsource_MLIST
http://www.debian.org/security/2011/dsa-2252
vendor-advisory
x_refsource_DEBIAN
http://www.mandriva.com/security/advisories?name=MDVSA-2011:101
vendor-advisory
x_refsource_MANDRIVA
http://www.dovecot.org/doc/NEWS-2.0
x_refsource_CONFIRM
https://bugzilla.redhat.com/show_bug.cgi?id=706286
x_refsource_CONFIRM
http://dovecot.org/pipermail/dovecot/2011-May/059085.html
mailing-list
x_refsource_MLIST
http://www.redhat.com/support/errata/RHSA-2011-1187.html
vendor-advisory
x_refsource_REDHAT
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060825.html
vendor-advisory
x_refsource_FEDORA
http://osvdb.org/72495
vdb-entry
x_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilities/67589
vdb-entry
x_refsource_XF
https://hermes.opensuse.org/messages/8581790
vendor-advisory
x_refsource_SUSE
http://www.securityfocus.com/bid/47930
vdb-entry
x_refsource_BID
http://openwall.com/lists/oss-security/2011/05/19/6
mailing-list
x_refsource_MLIST
http://secunia.com/advisories/44756
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/44827
third-party-advisory
x_refsource_SECUNIA
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060815.html
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/44683
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/44712
third-party-advisory
x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-1143-1
vendor-advisory
x_refsource_UBUNTU
http://openwall.com/lists/oss-security/2011/05/19/3
mailing-list
x_refsource_MLIST
http://www.dovecot.org/doc/NEWS-1.2
x_refsource_CONFIRM
http://openwall.com/lists/oss-security/2011/05/18/4
mailing-list
x_refsource_MLIST
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061384.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://hg.dovecot.org/dovecot-1.1/rev/3698dfe0f21c
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/44771
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://dovecot.org/pipermail/dovecot/2011-May/059086.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.debian.org/security/2011/dsa-2252
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2011:101
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://www.dovecot.org/doc/NEWS-2.0
Resource:
x_refsource_CONFIRM
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=706286
Resource:
x_refsource_CONFIRM
Hyperlink: http://dovecot.org/pipermail/dovecot/2011-May/059085.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.redhat.com/support/errata/RHSA-2011-1187.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060825.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://osvdb.org/72495
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/67589
Resource:
vdb-entry
x_refsource_XF
Hyperlink: https://hermes.opensuse.org/messages/8581790
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.securityfocus.com/bid/47930
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://openwall.com/lists/oss-security/2011/05/19/6
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://secunia.com/advisories/44756
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/44827
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060815.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/44683
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/44712
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ubuntu.com/usn/USN-1143-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://openwall.com/lists/oss-security/2011/05/19/3
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.dovecot.org/doc/NEWS-1.2
Resource:
x_refsource_CONFIRM
Hyperlink: http://openwall.com/lists/oss-security/2011/05/18/4
Resource:
mailing-list
x_refsource_MLIST
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061384.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://hg.dovecot.org/dovecot-1.1/rev/3698dfe0f21c
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/44771
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://dovecot.org/pipermail/dovecot/2011-May/059086.html
mailing-list
x_refsource_MLIST
x_transferred
http://www.debian.org/security/2011/dsa-2252
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2011:101
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://www.dovecot.org/doc/NEWS-2.0
x_refsource_CONFIRM
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=706286
x_refsource_CONFIRM
x_transferred
http://dovecot.org/pipermail/dovecot/2011-May/059085.html
mailing-list
x_refsource_MLIST
x_transferred
http://www.redhat.com/support/errata/RHSA-2011-1187.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060825.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://osvdb.org/72495
vdb-entry
x_refsource_OSVDB
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/67589
vdb-entry
x_refsource_XF
x_transferred
https://hermes.opensuse.org/messages/8581790
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.securityfocus.com/bid/47930
vdb-entry
x_refsource_BID
x_transferred
http://openwall.com/lists/oss-security/2011/05/19/6
mailing-list
x_refsource_MLIST
x_transferred
http://secunia.com/advisories/44756
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/44827
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060815.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/44683
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/44712
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ubuntu.com/usn/USN-1143-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://openwall.com/lists/oss-security/2011/05/19/3
mailing-list
x_refsource_MLIST
x_transferred
http://www.dovecot.org/doc/NEWS-1.2
x_refsource_CONFIRM
x_transferred
http://openwall.com/lists/oss-security/2011/05/18/4
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061384.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://hg.dovecot.org/dovecot-1.1/rev/3698dfe0f21c
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/44771
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://dovecot.org/pipermail/dovecot/2011-May/059086.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.debian.org/security/2011/dsa-2252
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2011:101
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://www.dovecot.org/doc/NEWS-2.0
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=706286
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://dovecot.org/pipermail/dovecot/2011-May/059085.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2011-1187.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060825.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://osvdb.org/72495
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/67589
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: https://hermes.opensuse.org/messages/8581790
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.securityfocus.com/bid/47930
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://openwall.com/lists/oss-security/2011/05/19/6
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://secunia.com/advisories/44756
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/44827
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060815.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/44683
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/44712
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ubuntu.com/usn/USN-1143-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://openwall.com/lists/oss-security/2011/05/19/3
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.dovecot.org/doc/NEWS-1.2
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://openwall.com/lists/oss-security/2011/05/18/4
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:24 May, 2011 | 23:55
Updated At:29 Apr, 2026 | 01:13

lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

Dovecot
dovecot
>>dovecot>>1.2.0
cpe:2.3:a:dovecot:dovecot:1.2.0:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>1.2.1
cpe:2.3:a:dovecot:dovecot:1.2.1:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>1.2.2
cpe:2.3:a:dovecot:dovecot:1.2.2:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>1.2.3
cpe:2.3:a:dovecot:dovecot:1.2.3:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>1.2.4
cpe:2.3:a:dovecot:dovecot:1.2.4:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>1.2.5
cpe:2.3:a:dovecot:dovecot:1.2.5:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>1.2.6
cpe:2.3:a:dovecot:dovecot:1.2.6:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>1.2.7
cpe:2.3:a:dovecot:dovecot:1.2.7:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>1.2.8
cpe:2.3:a:dovecot:dovecot:1.2.8:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>1.2.9
cpe:2.3:a:dovecot:dovecot:1.2.9:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>1.2.10
cpe:2.3:a:dovecot:dovecot:1.2.10:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>1.2.11
cpe:2.3:a:dovecot:dovecot:1.2.11:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>1.2.12
cpe:2.3:a:dovecot:dovecot:1.2.12:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>1.2.13
cpe:2.3:a:dovecot:dovecot:1.2.13:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>1.2.14
cpe:2.3:a:dovecot:dovecot:1.2.14:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>1.2.15
cpe:2.3:a:dovecot:dovecot:1.2.15:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>1.2.16
cpe:2.3:a:dovecot:dovecot:1.2.16:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>2.0
cpe:2.3:a:dovecot:dovecot:2.0:beta1:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>2.0.0
cpe:2.3:a:dovecot:dovecot:2.0.0:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>2.0.1
cpe:2.3:a:dovecot:dovecot:2.0.1:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>2.0.2
cpe:2.3:a:dovecot:dovecot:2.0.2:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>2.0.3
cpe:2.3:a:dovecot:dovecot:2.0.3:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>2.0.4
cpe:2.3:a:dovecot:dovecot:2.0.4:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>2.0.5
cpe:2.3:a:dovecot:dovecot:2.0.5:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>2.0.6
cpe:2.3:a:dovecot:dovecot:2.0.6:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>2.0.7
cpe:2.3:a:dovecot:dovecot:2.0.7:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>2.0.8
cpe:2.3:a:dovecot:dovecot:2.0.8:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>2.0.9
cpe:2.3:a:dovecot:dovecot:2.0.9:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>2.0.10
cpe:2.3:a:dovecot:dovecot:2.0.10:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>2.0.11
cpe:2.3:a:dovecot:dovecot:2.0.11:*:*:*:*:*:*:*
Dovecot
dovecot
>>dovecot>>2.0.12
cpe:2.3:a:dovecot:dovecot:2.0.12:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarynvd@nist.gov
CWE ID: CWE-20
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://dovecot.org/pipermail/dovecot/2011-May/059085.htmlsecalert@redhat.com
Patch
http://dovecot.org/pipermail/dovecot/2011-May/059086.htmlsecalert@redhat.com
Patch
http://hg.dovecot.org/dovecot-1.1/rev/3698dfe0f21csecalert@redhat.com
Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061384.htmlsecalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060815.htmlsecalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060825.htmlsecalert@redhat.com
N/A
http://openwall.com/lists/oss-security/2011/05/18/4secalert@redhat.com
Patch
http://openwall.com/lists/oss-security/2011/05/19/3secalert@redhat.com
Patch
http://openwall.com/lists/oss-security/2011/05/19/6secalert@redhat.com
Patch
http://osvdb.org/72495secalert@redhat.com
N/A
http://secunia.com/advisories/44683secalert@redhat.com
N/A
http://secunia.com/advisories/44712secalert@redhat.com
N/A
http://secunia.com/advisories/44756secalert@redhat.com
N/A
http://secunia.com/advisories/44771secalert@redhat.com
N/A
http://secunia.com/advisories/44827secalert@redhat.com
N/A
http://www.debian.org/security/2011/dsa-2252secalert@redhat.com
N/A
http://www.dovecot.org/doc/NEWS-1.2secalert@redhat.com
N/A
http://www.dovecot.org/doc/NEWS-2.0secalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2011:101secalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2011-1187.htmlsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/47930secalert@redhat.com
N/A
http://www.ubuntu.com/usn/USN-1143-1secalert@redhat.com
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=706286secalert@redhat.com
Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/67589secalert@redhat.com
N/A
https://hermes.opensuse.org/messages/8581790secalert@redhat.com
N/A
http://dovecot.org/pipermail/dovecot/2011-May/059085.htmlaf854a3a-2127-422b-91ae-364da2661108
Patch
http://dovecot.org/pipermail/dovecot/2011-May/059086.htmlaf854a3a-2127-422b-91ae-364da2661108
Patch
http://hg.dovecot.org/dovecot-1.1/rev/3698dfe0f21caf854a3a-2127-422b-91ae-364da2661108
Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061384.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060815.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060825.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://openwall.com/lists/oss-security/2011/05/18/4af854a3a-2127-422b-91ae-364da2661108
Patch
http://openwall.com/lists/oss-security/2011/05/19/3af854a3a-2127-422b-91ae-364da2661108
Patch
http://openwall.com/lists/oss-security/2011/05/19/6af854a3a-2127-422b-91ae-364da2661108
Patch
http://osvdb.org/72495af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/44683af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/44712af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/44756af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/44771af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/44827af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.debian.org/security/2011/dsa-2252af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.dovecot.org/doc/NEWS-1.2af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.dovecot.org/doc/NEWS-2.0af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2011:101af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2011-1187.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/47930af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ubuntu.com/usn/USN-1143-1af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=706286af854a3a-2127-422b-91ae-364da2661108
Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/67589af854a3a-2127-422b-91ae-364da2661108
N/A
https://hermes.opensuse.org/messages/8581790af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://dovecot.org/pipermail/dovecot/2011-May/059085.html
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://dovecot.org/pipermail/dovecot/2011-May/059086.html
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://hg.dovecot.org/dovecot-1.1/rev/3698dfe0f21c
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061384.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060815.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060825.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://openwall.com/lists/oss-security/2011/05/18/4
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://openwall.com/lists/oss-security/2011/05/19/3
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://openwall.com/lists/oss-security/2011/05/19/6
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://osvdb.org/72495
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/44683
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/44712
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/44756
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/44771
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/44827
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.debian.org/security/2011/dsa-2252
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.dovecot.org/doc/NEWS-1.2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.dovecot.org/doc/NEWS-2.0
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2011:101
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2011-1187.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/47930
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-1143-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=706286
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/67589
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://hermes.opensuse.org/messages/8581790
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://dovecot.org/pipermail/dovecot/2011-May/059085.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://dovecot.org/pipermail/dovecot/2011-May/059086.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://hg.dovecot.org/dovecot-1.1/rev/3698dfe0f21c
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061384.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060815.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060825.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://openwall.com/lists/oss-security/2011/05/18/4
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://openwall.com/lists/oss-security/2011/05/19/3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://openwall.com/lists/oss-security/2011/05/19/6
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://osvdb.org/72495
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/44683
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/44712
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/44756
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/44771
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/44827
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.debian.org/security/2011/dsa-2252
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.dovecot.org/doc/NEWS-1.2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.dovecot.org/doc/NEWS-2.0
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2011:101
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2011-1187.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/47930
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-1143-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=706286
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/67589
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://hermes.opensuse.org/messages/8581790
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

1110Records found

CVE-2017-2669
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-3.7||LOW
EPSS-6.87% / 91.42%
||
7 Day CHG~0.00%
Published-21 Jun, 2018 | 13:00
Updated-05 Aug, 2024 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dovecot before version 2.2.29 is vulnerable to a denial of service. When 'dict' passdb and userdb were used for user authentication, the username sent by the IMAP/POP3 client was sent through var_expand() to perform %variable expansion. Sending specially crafted %variable fields could result in excessive memory usage causing the process to crash (and restart), or excessive CPU usage causing all authentications to hang.

Action-Not Available
Vendor-[UNKNOWN]Debian GNU/LinuxDovecot
Product-debian_linuxdovecotdovecot
CWE ID-CWE-20
Improper Input Validation
CVE-2020-25275
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-3.36% / 87.39%
||
7 Day CHG~0.00%
Published-04 Jan, 2021 | 16:19
Updated-04 Aug, 2024 | 15:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dovecot before 2.3.13 has Improper Input Validation in lda, lmtp, and imap, leading to an application crash via a crafted email message with certain choices for ten thousand MIME parts.

Action-Not Available
Vendor-n/aFedora ProjectDebian GNU/LinuxDovecot
Product-debian_linuxfedoradovecotn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2020-10967
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-3.36% / 87.41%
||
7 Day CHG~0.00%
Published-18 May, 2020 | 14:02
Updated-04 Aug, 2024 | 11:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Dovecot before 2.3.10.1, remote unauthenticated attackers can crash the lmtp or submission process by sending mail with an empty localpart.

Action-Not Available
Vendor-n/aDovecot
Product-dovecotn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2013-2111
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-0.77% / 73.58%
||
7 Day CHG~0.00%
Published-27 May, 2014 | 15:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The IMAP functionality in Dovecot before 2.2.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via invalid APPEND parameters.

Action-Not Available
Vendor-n/aDovecot
Product-dovecotn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2020-7957
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-3.1||LOW
EPSS-0.54% / 67.63%
||
7 Day CHG~0.00%
Published-12 Feb, 2020 | 16:50
Updated-04 Aug, 2024 | 09:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The IMAP and LMTP components in Dovecot 2.3.9 before 2.3.9.3 mishandle snippet generation when many characters must be read to compute the snippet and a trailing > character exists. This causes a denial of service in which the recipient cannot read all of their messages.

Action-Not Available
Vendor-n/aFedora ProjectDovecot
Product-fedoradovecotn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2017-15132
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-4.61% / 89.30%
||
7 Day CHG~0.00%
Published-25 Jan, 2018 | 20:00
Updated-17 Sep, 2024 | 00:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0. An abort of SASL authentication results in a memory leak in dovecot's auth client used by login processes. The leak has impact in high performance configuration where same login processes are reused and can cause the process to crash due to memory exhaustion.

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxDovecot
Product-ubuntu_linuxdebian_linuxdovecotdovecot
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2020-10957
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-8.10% / 92.18%
||
7 Day CHG~0.00%
Published-18 May, 2020 | 13:56
Updated-04 Aug, 2024 | 11:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Dovecot before 2.3.10.1, unauthenticated sending of malformed parameters to a NOOP command causes a NULL Pointer Dereference and crash in submission-login, submission, or lmtp.

Action-Not Available
Vendor-n/aDovecot
Product-dovecotn/a
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2020-12674
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-25.80% / 96.29%
||
7 Day CHG~0.00%
Published-12 Aug, 2020 | 15:20
Updated-04 Aug, 2024 | 12:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Dovecot before 2.3.11.3, sending a specially formatted RPA request will crash the auth service because a length of zero is mishandled.

Action-Not Available
Vendor-n/aCanonical Ltd.Fedora ProjectDebian GNU/LinuxDovecot
Product-ubuntu_linuxdebian_linuxfedoradovecotn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-12100
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-19.61% / 95.45%
||
7 Day CHG~0.00%
Published-12 Aug, 2020 | 15:07
Updated-04 Aug, 2024 | 11:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Dovecot before 2.3.11.3, uncontrolled recursion in submission, lmtp, and lda allows remote attackers to cause a denial of service (resource consumption) via a crafted e-mail message with deeply nested MIME parts.

Action-Not Available
Vendor-n/aCanonical Ltd.Fedora ProjectDebian GNU/LinuxDovecot
Product-ubuntu_linuxdebian_linuxfedoradovecotn/a
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2020-10958
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.52% / 66.89%
||
7 Day CHG~0.00%
Published-18 May, 2020 | 14:00
Updated-04 Aug, 2024 | 11:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Dovecot before 2.3.10.1, a crafted SMTP/LMTP message triggers an unauthenticated use-after-free bug in submission-login, submission, or lmtp, and can lead to a crash under circumstances involving many newlines after a command.

Action-Not Available
Vendor-n/aDovecot
Product-dovecotn/a
CWE ID-CWE-416
Use After Free
CVE-2019-19722
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-1.39% / 80.44%
||
7 Day CHG~0.00%
Published-13 Dec, 2019 | 16:34
Updated-05 Aug, 2024 | 02:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Dovecot before 2.3.9.2, an attacker can crash a push-notification driver with a crafted email when push notifications are used, because of a NULL Pointer Dereference. The email must use a group address as either the sender or the recipient.

Action-Not Available
Vendor-n/aFedora ProjectDovecot
Product-fedoradovecotn/a
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2010-0745
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-1.88% / 83.26%
||
7 Day CHG~0.00%
Published-20 May, 2010 | 17:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.

Action-Not Available
Vendor-n/aDovecot
Product-dovecotn/a
CVE-2019-11494
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.54% / 81.43%
||
7 Day CHG~0.00%
Published-08 May, 2019 | 17:04
Updated-04 Aug, 2024 | 22:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login service crashes when the client disconnects prematurely during the AUTH command.

Action-Not Available
Vendor-n/aFedora ProjectopenSUSEDovecot
Product-fedoradovecotleapn/a
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2019-11499
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.33% / 80.04%
||
7 Day CHG~0.00%
Published-08 May, 2019 | 17:00
Updated-04 Aug, 2024 | 22:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login component crashes if AUTH PLAIN is attempted over a TLS secured channel with an unacceptable authentication message.

Action-Not Available
Vendor-n/aFedora ProjectopenSUSEDovecot
Product-fedoradovecotleapn/a
CVE-2019-10691
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.62% / 81.92%
||
7 Day CHG~0.00%
Published-24 Apr, 2019 | 16:49
Updated-04 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The JSON encoder in Dovecot before 2.3.5.2 allows attackers to repeatedly crash the authentication service by attempting to authenticate with an invalid UTF-8 sequence as the username.

Action-Not Available
Vendor-n/aopenSUSEDovecot
Product-dovecotleapn/a
CVE-2014-3430
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-8.35% / 92.32%
||
7 Day CHG~0.00%
Published-14 May, 2014 | 19:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dovecot 1.1 before 2.2.13 and dovecot-ee before 2.1.7.7 and 2.2.x before 2.2.12.12 does not properly close old connections, which allows remote attackers to cause a denial of service (resource consumption) via an incomplete SSL/TLS handshake for an IMAP/POP3 connection.

Action-Not Available
Vendor-n/aDovecot
Product-dovecotn/a
CWE ID-CWE-287
Improper Authentication
CVE-2020-12673
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-5.63% / 90.39%
||
7 Day CHG~0.00%
Published-12 Aug, 2020 | 15:18
Updated-04 Aug, 2024 | 12:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Dovecot before 2.3.11.3, sending a specially formatted NTLM request will crash the auth service because of an out-of-bounds read.

Action-Not Available
Vendor-n/aCanonical Ltd.Fedora ProjectDebian GNU/LinuxDovecot
Product-ubuntu_linuxdebian_linuxfedoradovecotn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2011-4318
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.38% / 59.47%
||
7 Day CHG~0.00%
Published-07 Mar, 2013 | 01:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.

Action-Not Available
Vendor-n/aDovecot
Product-dovecotn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-8652
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-9.42% / 92.83%
||
7 Day CHG~0.00%
Published-16 Feb, 2017 | 18:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The auth component in Dovecot before 2.2.27, when auth-policy is configured, allows a remote attackers to cause a denial of service (crash) by aborting authentication without setting a username.

Action-Not Available
Vendor-n/aDovecot
Product-dovecotn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2025-59032
Matching Score-6
Assigner-Open-Xchange
ShareView Details
Matching Score-6
Assigner-Open-Xchange
CVSS Score-7.5||HIGH
EPSS-0.06% / 18.54%
||
7 Day CHG-0.05%
Published-27 Mar, 2026 | 08:10
Updated-30 Apr, 2026 | 17:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ManageSieve AUTHENTICATE command crashes when using literal as SASL initial response. This can be used to crash ManageSieve service repeatedly, making it unavailable for other users. Control access to ManageSieve port, or disable the service if it's not needed. Alternatively upgrade to a fixed version. No publicly available exploits are known.

Action-Not Available
Vendor-Open-Xchange AGDovecot
Product-dovecotOX Dovecot Pro
CWE ID-CWE-20
Improper Input Validation
CVE-2025-59028
Matching Score-6
Assigner-Open-Xchange
ShareView Details
Matching Score-6
Assigner-Open-Xchange
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 16.26%
||
7 Day CHG-0.06%
Published-27 Mar, 2026 | 08:10
Updated-30 Apr, 2026 | 17:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When sending invalid base64 SASL data, login process is disconnected from the auth server, causing all active authentication sessions to fail. Invalid BASE64 data can be used to DoS a vulnerable server to break concurrent logins. Install fixed version or disable concurrency in login processes (heavy perfomance penalty on large deployments). No publicly available exploits are known.

Action-Not Available
Vendor-Open-Xchange AGDovecot
Product-dovecotOX Dovecot Pro
CWE ID-CWE-20
Improper Input Validation
CVE-2008-4907
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-14.29% / 94.43%
||
7 Day CHG~0.00%
Published-04 Nov, 2008 | 00:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."

Action-Not Available
Vendor-n/aDovecot
Product-dovecotn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-1411
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-10.08% / 93.12%
||
7 Day CHG~0.00%
Published-20 Mar, 2008 | 10:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The PXE Server (pxesrv.exe) in Acronis Snap Deploy 2.0.0.1076 and earlier allows remote attackers to cause a denial of service (crash) via an incomplete TFTP request, which triggers a NULL pointer dereference.

Action-Not Available
Vendor-n/aAcronis (Acronis International GmbH)
Product-snap_deployn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-1532
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-2.25% / 84.67%
||
7 Day CHG~0.00%
Published-28 Mar, 2008 | 00:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Perlbal before 1.70, when buffered upload is enabled, allows remote attackers to cause a denial of service (crash) via a zero-byte chunked upload.

Action-Not Available
Vendor-perlbaln/a
Product-perlbaln/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-0171
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-3.37% / 87.42%
||
7 Day CHG~0.00%
Published-17 Jan, 2008 | 22:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

regex/v4/perl_matcher_non_recursive.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (failed assertion and crash) via an invalid regular expression.

Action-Not Available
Vendor-boostn/a
Product-boost_regex_libraryboostn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-8049
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.78% / 73.71%
||
7 Day CHG~0.00%
Published-03 Apr, 2018 | 22:00
Updated-05 Aug, 2024 | 06:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Stealth endpoint in Unisys Stealth SVG 2.8.x, 3.0.x before 3.0.1999, 3.1.x, 3.2.x before 3.2.030, and 3.3.x before 3.3.016, when running on Linux and AIX, allows remote attackers to cause a denial of service (crash) via crafted packets.

Action-Not Available
Vendor-unisysn/aIBM CorporationLinux Kernel Organization, Inc
Product-aixlinux_kernelstealth_svgn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-0791
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.27% / 79.63%
||
7 Day CHG-0.02%
Published-15 Feb, 2008 | 01:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ipdsserver.exe in Intermate WinIPDS 3.3 G52-33-021 allows remote attackers to cause a denial of service (CPU consumption) via short packets on TCP port 5001 with the 3, 5, 7, 13, 14, or 15 packet types.

Action-Not Available
Vendor-intermaten/a
Product-winipdsn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2007-6224
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.84% / 74.84%
||
7 Day CHG~0.00%
Published-04 Dec, 2007 | 18:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The RealNetworks RealAudioObjects.RealAudio ActiveX control in rmoc3260.dll, as shipped with RealPlayer 11, allows remote attackers to cause a denial of service (browser crash) via a certain argument to the GetSourceTransport method.

Action-Not Available
Vendor-n/aRealNetworks LLCMicrosoft Corporation
Product-realplayerwindows_vistawindows_xpn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-7429
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.60% / 69.50%
||
7 Day CHG~0.00%
Published-23 Oct, 2018 | 21:00
Updated-05 Aug, 2024 | 06:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Splunkd in Splunk Enterprise 6.2.x before 6.2.14 6.3.x before 6.3.11, and 6.4.x before 6.4.8; and Splunk Light before 6.5.0 allow remote attackers to cause a denial of service via a malformed HTTP request.

Action-Not Available
Vendor-n/aSplunk LLC (Cisco Systems, Inc.)
Product-splunkn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2007-6235
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-6.36% / 91.05%
||
7 Day CHG~0.00%
Published-04 Dec, 2007 | 18:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A certain ActiveX control in RealNetworks RealPlayer 11 allows remote attackers to cause a denial of service (application crash) via a malformed .au file that triggers a divide-by-zero error. NOTE: this might be related to CVE-2007-4904.

Action-Not Available
Vendor-n/aRealNetworks LLC
Product-realplayern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2007-4755
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-2.31% / 84.85%
||
7 Day CHG~0.00%
Published-08 Sep, 2007 | 01:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Alien Arena 2007 6.10 and earlier allows remote attackers to cause a denial of service (client disconnect) by sending a client_connect command in a forged packet from the server to a client. NOTE: client IP addresses are available via product-specific queries.

Action-Not Available
Vendor-cor_entertainmentn/a
Product-alien_arena_2007n/a
CWE ID-CWE-20
Improper Input Validation
CVE-2017-13735
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.34% / 56.82%
||
7 Day CHG~0.00%
Published-29 Aug, 2017 | 06:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is a floating point exception in the kodak_radc_load_raw function in dcraw_common.cpp in LibRaw 0.18.2. It will lead to a remote denial of service attack.

Action-Not Available
Vendor-librawn/a
Product-librawn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2007-3780
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-9.00% / 92.64%
||
7 Day CHG~0.00%
Published-15 Jul, 2007 | 22:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MySQL Community Server before 5.0.45 allows remote attackers to cause a denial of service (daemon crash) via a malformed password packet in the connection protocol.

Action-Not Available
Vendor-mysqln/a
Product-community_servern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2007-3389
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-26.46% / 96.35%
||
7 Day CHG~0.00%
Published-26 Jun, 2007 | 00:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via a crafted chunked encoding in an HTTP response, possibly related to a zero-length payload.

Action-Not Available
Vendor-n/aWireshark Foundation
Product-wiresharkn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2005-2806
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.13% / 78.41%
||
7 Day CHG~0.00%
Published-06 Sep, 2005 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

client.cpp in BNBT EasyTracker 7.7r3.2004.10.27 and earlier allows remote attackers to cause a denial of service (application hang) via an HTTP header containing only a ":" (colon), possibly leading to an integer signedness error due to a missing field name or value.

Action-Not Available
Vendor-trevor_hogann/a
Product-bnbtn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2013-1282
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5||MEDIUM
EPSS-45.22% / 97.62%
||
7 Day CHG~0.00%
Published-09 Apr, 2013 | 22:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The LDAP service in Microsoft Active Directory, Active Directory Application Mode (ADAM), Active Directory Lightweight Directory Service (AD LDS), and Active Directory Services allows remote attackers to cause a denial of service (memory consumption and service outage) via a crafted query, aka "Memory Consumption Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-active_directory_servicesactive_directory_lightweight_directory_serviceactive_directoryactive_directory_application_moden/a
CWE ID-CWE-20
Improper Input Validation
CVE-2013-4930
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.15% / 78.58%
||
7 Day CHG~0.00%
Published-29 Jul, 2013 | 19:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.

Action-Not Available
Vendor-n/aWireshark Foundation
Product-wiresharkn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2017-11555
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.25% / 48.02%
||
7 Day CHG~0.00%
Published-23 Jul, 2017 | 03:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is an illegal address access in the Eval::operator function in eval.cpp in LibSass 3.4.5. A crafted input will lead to a remote denial of service.

Action-Not Available
Vendor-libsassn/a
Product-libsassn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-8038
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-50.43% / 97.86%
||
7 Day CHG~0.00%
Published-05 Jul, 2018 | 13:00
Updated-16 Sep, 2024 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Versions of Apache CXF Fediz prior to 1.4.4 do not fully disable Document Type Declarations (DTDs) when either parsing the Identity Provider response in the application plugins, or in the Identity Provider itself when parsing certain XML-based parameters.

Action-Not Available
Vendor-The Apache Software Foundation
Product-cxf_fedizApache CXF Fediz
CWE ID-CWE-20
Improper Input Validation
CVE-2018-7432
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.58% / 68.88%
||
7 Day CHG~0.00%
Published-23 Oct, 2018 | 21:00
Updated-05 Aug, 2024 | 06:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Splunk Enterprise 6.2.x before 6.2.14, 6.3.x before 6.3.10, 6.4.x before 6.4.7, and 6.5.x before 6.5.3; and Splunk Light before 6.6.0 allow remote attackers to cause a denial of service via a crafted HTTP request.

Action-Not Available
Vendor-n/aSplunk LLC (Cisco Systems, Inc.)
Product-splunkn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2004-2533
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-5.45% / 90.22%
||
7 Day CHG~0.00%
Published-25 Oct, 2005 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Serv-U FTP Server 4.1 (possibly 4.0) allows remote attackers to cause a denial of service (application crash) via a SITE CHMOD command with a "\\...\" followed by a short string, causing partial memory corruption, a different vulnerability than CVE-2004-2111.

Action-Not Available
Vendor-n/aSolarWinds Worldwide, LLC.
Product-serv-u_file_servern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-7449
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-20.85% / 95.65%
||
7 Day CHG~0.00%
Published-04 Mar, 2018 | 01:00
Updated-05 Aug, 2024 | 06:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SEGGER FTP Server for Windows before 3.22a allows remote attackers to cause a denial of service (daemon crash) via an invalid LIST, STOR, or RETR command.

Action-Not Available
Vendor-seggern/aMicrosoft Corporation
Product-windowsembos\/ip_ftp_servern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2013-4100
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-1.13% / 78.41%
||
7 Day CHG~0.00%
Published-04 Nov, 2019 | 14:55
Updated-06 Aug, 2024 | 16:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cryptocat before 2.0.22 has Remote Denial of Service via username

Action-Not Available
Vendor-cryptocat_projectn/a
Product-cryptocatn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2004-2592
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-4.67% / 89.38%
||
7 Day CHG~0.00%
Published-29 Nov, 2005 | 02:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Quake II server before R1Q2, as used in multiple products, allows remote attackers to cause a denial of service (application crash) via a modified client that asks the server to send data stored at a negative array offset, which is not handled when processing Configstrings and Baselines.

Action-Not Available
Vendor-id_softwaren/a
Product-quake_ii_servern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2004-1777
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.92% / 75.99%
||
7 Day CHG~0.00%
Published-03 May, 2005 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A "range check error" in Skype for Windows before 0.98.0.28 allows local and remote attackers to cause a denial of service (application crash) via long command line arguments or a long callto:// URL, a different vulnerability than CVE-2004-1114.

Action-Not Available
Vendor-skype_technologiesn/a
Product-skypen/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-8065
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-77.17% / 98.99%
||
7 Day CHG~0.00%
Published-12 Mar, 2018 | 00:00
Updated-05 Aug, 2024 | 06:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the web server in Flexense SyncBreeze Enterprise 10.6.24. There is a user mode write access violation on the syncbrs.exe memory region that can be triggered by rapidly sending a variety of HTTP requests with long HTTP header values or long URIs.

Action-Not Available
Vendor-flexensen/a
Product-syncbreezen/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-7658
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-17.99% / 95.19%
||
7 Day CHG~0.00%
Published-26 Mar, 2018 | 21:00
Updated-05 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NTSServerSvc.exe in the server in Softros Network Time System 2.3.4 allows remote attackers to cause a denial of service (daemon crash) by sending exactly 11 bytes.

Action-Not Available
Vendor-softrosn/a
Product-network_time_systemn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-8030
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-0.91% / 75.83%
||
7 Day CHG~0.00%
Published-19 Jun, 2018 | 13:00
Updated-16 Sep, 2024 | 19:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Denial of Service vulnerability was found in Apache Qpid Broker-J versions 7.0.0-7.0.4 when AMQP protocols 0-8, 0-9 or 0-91 are used to publish messages with size greater than allowed maximum message size limit (100MB by default). The broker crashes due to the defect. AMQP protocols 0-10 and 1.0 are not affected.

Action-Not Available
Vendor-The Apache Software Foundation
Product-qpid_broker-jApache Qpid Broker-J
CWE ID-CWE-20
Improper Input Validation
CVE-2004-1617
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-3.67% / 87.95%
||
7 Day CHG~0.00%
Published-20 Feb, 2005 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lynx, lynx-ssl, and lynx-cur before 2.8.6dev.8 allow remote attackers to cause a denial of service (infinite loop) via a web page or HTML email that contains invalid HTML including (1) a TEXTAREA tag with a large COLS value and (2) a large tag name in an element that is not terminated, as demonstrated by mangleme. NOTE: a followup suggests that the relevant trigger for this issue is the large COLS value.

Action-Not Available
Vendor-university_of_kansasn/a
Product-lynxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-8022
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-6.14% / 90.86%
||
7 Day CHG~0.00%
Published-29 Aug, 2018 | 13:00
Updated-16 Sep, 2024 | 21:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A carefully crafted invalid TLS handshake can cause Apache Traffic Server (ATS) to segfault. This affects version 6.2.2. To resolve this issue users running 6.2.2 should upgrade to 6.2.3 or later versions.

Action-Not Available
Vendor-The Apache Software Foundation
Product-traffic_serverApache Traffic Server
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 22
  • 23
  • Next
Details not found